Proceedings of the International Conference on Research in Adaptive and Convergent Systems最新文献

筛选
英文 中文
Road Surface Profiling based on Artificial-Neural Networks 基于人工神经网络的路面轮廓分析
Seungho Choi, Seoyeon Kim, Heelim Hong, Y. B. Kim
{"title":"Road Surface Profiling based on Artificial-Neural Networks","authors":"Seungho Choi, Seoyeon Kim, Heelim Hong, Y. B. Kim","doi":"10.1145/3400286.3418282","DOIUrl":"https://doi.org/10.1145/3400286.3418282","url":null,"abstract":"Recently, monitoring of road surface is a key factor for road maintenance and management. With the advances in the optical methods, the road monitoring systems have been equipped with high accuracy and resolution sensor package. However, most of the existing sensor packages are equipped with expensive equipment such as optical and complex sensors in considering the dynamics of mobile vehicles and dynamic outdoor environments. In this paper, we propose a CNN-based line laser refinement. The proposed system is designed based on the improvement of CNN-based line lasers, and it is more cost-effective than the existing expensive system.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114901500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selecting a Proper Neuromorphic Platform for the Intelligent IoT 为智能物联网选择合适的神经形态平台
Kicheol Park, Y. Lee, Jiman Hong, J. An, Bongjae Kim
{"title":"Selecting a Proper Neuromorphic Platform for the Intelligent IoT","authors":"Kicheol Park, Y. Lee, Jiman Hong, J. An, Bongjae Kim","doi":"10.1145/3400286.3418264","DOIUrl":"https://doi.org/10.1145/3400286.3418264","url":null,"abstract":"With the rapid development of the Internet of Things (IoT) and AI technology, IoT services based on Artificial Intelligence (AI) technology are becoming more and more intelligent. To provide these intelligent IoT services, IoT hardware and IoT software must support AI technology. In general, battery-powered IoT devices have limited computing power compared to general-purpose computers. Therefore, to implement various intelligent IoT services, it must be able to support AI technology with low power to IoT devices. The low-power Neuromorphic architecture can enable resource-limited IoT devices to provide intelligent IoT services based on AI technology. In this paper, we propose a Neuromorphic Architecture Abstraction (NAA) model for providing an efficient intelligent IoT service. The proposed NAA model dynamically selects the proper Neuromorphic architecture according to the characteristics of the training target architecture and increases the training speed and training success rate. We also implement the proposed model in a real IoT computing environment and show that the proposed NAA model can reduce the training speed and reduce the training models success rate compared with the method of randomly specifying the Neuromorphic architecture.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130487030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhanced Privacy with Blockchain-based Storage for Data Sharing 通过基于区块链的数据共享存储增强隐私
Yung-Feng Lu, Hung-Ming Chen, Chin-Fu Kuo, Bo-Ting Chen, Zong-Yan Dai
{"title":"Enhanced Privacy with Blockchain-based Storage for Data Sharing","authors":"Yung-Feng Lu, Hung-Ming Chen, Chin-Fu Kuo, Bo-Ting Chen, Zong-Yan Dai","doi":"10.1145/3400286.3418242","DOIUrl":"https://doi.org/10.1145/3400286.3418242","url":null,"abstract":"The core concept of electronic money is blockchain, which can be regarded as a decentralized database. It is a decentralized storage service that does not rely on third-party storage. It records each transaction information on the block. Related applications include electronic ledgers, which further extend smart contracts. In storage, not only record transactions, but the extended smart contract can be used in medical treatment, recording the patient's medical records. However, there is a need for privacy in medical records, and it must be able to be accessed by appropriate people in accordance with the authority. So it needs a technology like Enigma to achieve it. Enigma uses multi-party computation (hereinafter referred to as MPC) and distributed hash-table (hereinafter referred to as DHT) technology, combined with the blockchain to divide the data to be stored into public blocks and private parts The blockchain has an existing way of computing and storing, and private data is Enigma's method of computing and storing by using the method called Off-Chain. Only authenticated users can access private data. However, many applications have the need for group sharing and decentralized records. This study uses Enigma to encrypt the data that requires privacy using the key of the encrypted file and then uploads it to DHT for storage, so that the owner of the private data can further share the data securely.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132947500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cache Contention-aware Run-time Scheduling for Power-constrained Asymmetric Multicore Processors 功率受限非对称多核处理器的缓存竞争感知运行时调度
Jian-He Liao, He-Ru Chen, Ya-Shu Chen
{"title":"A Cache Contention-aware Run-time Scheduling for Power-constrained Asymmetric Multicore Processors","authors":"Jian-He Liao, He-Ru Chen, Ya-Shu Chen","doi":"10.1145/3400286.3418230","DOIUrl":"https://doi.org/10.1145/3400286.3418230","url":null,"abstract":"Asymmetric multicore architecture is widely applied to the embedded systems to better trade-off performance and energy consumption. With an increased number of applications concurrently executed in the system, the power consumption and the associated last-level cache latency are increased. To maximize the system performance under the power constraint, we proposed a cache contention-aware run-time scheduling for asymmetric multicore systems. To deal with the dynamic workload and cache contention effect, the CPI model learning is presented to adjust the relation between system performance, executing frequency, and executing clusters. Based on the CPI model prediction, the run-time dispatcher is then presented to determine the executing frequency and cores to maximize system throughput under power constraint. The proposed algorithm was implemented on the commercial Odroid XU4 board. The performance was evaluated using benchmarks and impressive results were obtained.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127092076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of Load-Balancing Solutions of Mobile Cloud Computing for Next-Generation Mobile Applications 面向下一代移动应用的移动云计算负载均衡解决方案研究
Rupak Kumar Das, Ahyoung Lee
{"title":"A Study of Load-Balancing Solutions of Mobile Cloud Computing for Next-Generation Mobile Applications","authors":"Rupak Kumar Das, Ahyoung Lee","doi":"10.1145/3400286.3418238","DOIUrl":"https://doi.org/10.1145/3400286.3418238","url":null,"abstract":"Mobile applications are nowadays one of the most important parts in every person's life. Today's smartphones are more capable of operating different type of applications. Mobile devices can create an interface between people and service providers. But due to limited computation power, storage, and battery capacity, it is not possible to computing all process in mobile devices. Thus, a cloud-based solution using mobile devices is an effective solution to overcome smartphones' constraints and gets access through anywhere for different kinds of facilities and services by offloading computation activities from mobile devices. These outputs of that computation are returned back to mobile devices. However, cloud resources are also limited. In order to use the limited cloud resources, load-balancing solutions are recommended for improving Hybrid cloud computing architectures. In this paper, we address why hybrid cloud computing is important in mobile applications and also demonstrate why load balancing is required in hybrid cloud computing architectures. We demonstrate and evaluate load-balancing performances using the ns-3 network simulation tool.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134243698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Failure Prediction by Utilizing Log Analysis: A Systematic Mapping Study 利用日志分析进行故障预测:系统映射研究
Dipta Das, Micah Schiewe, Elizabeth Brighton, Mark Fuller, T. Cerný, Miroslav Bures, Karel Frajták, Dongwan Shin, Pavel Tisnovsky
{"title":"Failure Prediction by Utilizing Log Analysis: A Systematic Mapping Study","authors":"Dipta Das, Micah Schiewe, Elizabeth Brighton, Mark Fuller, T. Cerný, Miroslav Bures, Karel Frajták, Dongwan Shin, Pavel Tisnovsky","doi":"10.1145/3400286.3418263","DOIUrl":"https://doi.org/10.1145/3400286.3418263","url":null,"abstract":"In modern computing, log files provide a wealth of information regarding the past of a system, including the system failures and security breaches that cost companies and developers a fortune in both time and money. While this information can be used to attempt to recover from a problem, such an approach merely mitigates the damage that has already been done. Detecting problems, however, is not the only information that can be gathered from log files. It is common knowledge that segments of log files, if analyzed correctly, can yield a good idea of what the system is likely going to do next in real-time, allowing a system to take corrective action before any negative actions occur. In this paper, the authors put forth a systematic map of this field of log prediction, screening several hundred papers and finally narrowing down the field to approximately 30 relevant papers. These papers, when broken down, give a good idea of the state of the art, methodologies employed, and future challenges that still must be overcome. Findings and conclusions of this study can be applied to a variety of software systems and components, including classical software systems, as well as software parts of control, or the Internet of Things (IoT) systems.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Semantic Classification of EMF-related Literature using Deep Learning Models with Attention Mechanism 基于注意机制的深度学习模型对电磁场相关文献的语义分类
Kwanghee Won, Youjeong Jang, Hyung-Do Choi, Sung Y. Shin
{"title":"Semantic Classification of EMF-related Literature using Deep Learning Models with Attention Mechanism","authors":"Kwanghee Won, Youjeong Jang, Hyung-Do Choi, Sung Y. Shin","doi":"10.1145/3400286.3418259","DOIUrl":"https://doi.org/10.1145/3400286.3418259","url":null,"abstract":"Semantic classification of scientific literature using machine learning approaches is challenging due to the lack of labeled data and the length of text [1, 4]. Most of the work has been done for keyword based categorization tasks, which take care of occurrence of important terms, whereas the semantic classification is to learn keywords as well as the meaning of sentences. In this study, we have evaluated neural network models on a semantic classification task using a large amount of labeled scientific papers listed in the Powerwatch study. We have conducted neural architecture search to find the most suitable model for the task. In the experiment, we have compared classification accuracy of various neural network models. In addition, we have employed a Fully Convolutional Neural Network (FCN) to implement attention mechanism for the semantic classification of EMF-related literature. The experimental result showed that the FCN-based attention model was able to identify important parts of input texts.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122386132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modifications using Circular Shift for a Better Bloom Filter 修改使用圆移位更好的布隆过滤器
Myeonghun Kim, Sung-Ryul Kim
{"title":"Modifications using Circular Shift for a Better Bloom Filter","authors":"Myeonghun Kim, Sung-Ryul Kim","doi":"10.1145/3400286.3418232","DOIUrl":"https://doi.org/10.1145/3400286.3418232","url":null,"abstract":"The Bloom filter is a hash-based data structure that facilitates membership querying. Computation speed of Bloom filter is affected by hash functions that produce hash outputs. Basically, two operations: 'add' and 'query', consists of the Bloom filter. Previous researches have shown advanced computation speed of Bloom filter since the standard Bloom Filter is published. For example, Double Hash Bloom filter, Single Hash Bloom filter, etc. We propose a system that uses less computation than previous works with similar false positive and which is implemented by using a circular bit shift. This method was implemented with faster calculation speed, compared with previous works. Furthermore, experiments which were compared with previous researches and standard Bloom filter. Therefore, we demonstrate that the proposed system computes faster than previous studies with similar false positive rate.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123434099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of a GPU-based Monte Carlo Simulation Package for Water Radiolysis with sub-MeV Electrons 基于gpu的亚mev电子水辐射分解蒙特卡罗模拟包的性能评估
Min-yu Tsai, Y. Lai, Y. Chi, X. Jia, Shih-Hao Hung
{"title":"Performance Evaluation of a GPU-based Monte Carlo Simulation Package for Water Radiolysis with sub-MeV Electrons","authors":"Min-yu Tsai, Y. Lai, Y. Chi, X. Jia, Shih-Hao Hung","doi":"10.1145/3400286.3418241","DOIUrl":"https://doi.org/10.1145/3400286.3418241","url":null,"abstract":"The simulation of water radiolysis including three stages, physical, physico-chemical and chemical, modeling the interactions between water and radicals is essential to understand the radiobiological mechanisms and quantitatively test some hypotheses in related problem. Monte Carlo (MC) simulation is recognized as one of the most accurate approaches for the computations of the water radiolysis process. Geant4-DNA which extending the Geant4 Monte Carlo simulation toolkit provides accurate descriptions of the initial physical process of ionization, along with the pre-chemical production of ion species and subsequent chemistry, in a single application for water radiolysis. To accelerate the long execution time of Geant4-DNA simulation, an open source GPU code for water radiolysis simulation, gMicroMC, has been developed. In this paper, we focus on reviewing the GPU implementation architecture of each stage of gMicroMC and evaluating the computational performance in the sub-MeV range of incident electrons. The experimental results of gMicroMC show up to three orders of magnitude performance gain, up to 1690x, with recent generations of NVIDIA graphic cards compared with Geant4-DNA running on a single CPU thread.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"10 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of commercial drone sounds and its identification 商用无人机声音分析及其识别
Sinwoo Yoo, H. Oh
{"title":"Analysis of commercial drone sounds and its identification","authors":"Sinwoo Yoo, H. Oh","doi":"10.1145/3400286.3418267","DOIUrl":"https://doi.org/10.1145/3400286.3418267","url":null,"abstract":"The usage of quadcopter types of drones is now on mature and a practical stage and many major manufacturers are expanding its applications into various regions with it. Considerable characteristic of this type of flying object as its maneuverability and practicality is now being focused on how we control this among our urban life from the possibility of any offensive usage. Most of them are either small enough to avoid many current airborne detection methods and cheap enough to use them as disposable. In this paper, we tried to analyze the recorded sounds of a subset of commercial quadcopter types of drones and built a trained simple non-linear neural network filter to classify them among the given sound samples. We borrowed Mel-frequency cepstral coefficients as the well-known methodology of sound analysis process but including some of the parameter adjustments for this research, and applied LeNet neural network filter structure for the following classification test. To maintain the information of adjacent samples among the series of wave samples, 2-D spectrogram planning was applied as for the input signal preprocessing. Most of the frequencies from drones were observed as gathered around 3 to 5Khz, up to around 10Khz, and adjusted LeNet architecture could classify over 10 types of drone categories with over 95% of accuracy.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130414073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信